Fix some typos detected by Lintian in manpages
Signed-off-by: Luca Boccassi <bluca@debian.org> Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
This commit is contained in:
parent
35c81b18c4
commit
af96c7b5dd
|
|
@ -10,7 +10,7 @@ Where:
|
|||
|
||||
ACTION semantics
|
||||
- pass and ok are equivalent to accept
|
||||
- continue allows to restart classification lookup
|
||||
- continue allows one to restart classification lookup
|
||||
- drop drops packets
|
||||
- reclassify implies continue classification where we left off
|
||||
|
||||
|
|
|
|||
|
|
@ -63,7 +63,7 @@ Command output show rate object identifier, it's type and rate values along with
|
|||
parent node name. Rate values printed in SI units which are more suitable to
|
||||
represent specific value. To print values in IEC units \fB-i\fR switch is
|
||||
used. JSON (\fB-j\fR) output always print rate values in bytes per second. Zero
|
||||
rate values means "unlimited" rates and ommited in output, as well as parent
|
||||
rate values means "unlimited" rates and omitted in output, as well as parent
|
||||
node name.
|
||||
|
||||
.SS devlink port function rate set - set rate object parameters.
|
||||
|
|
|
|||
|
|
@ -462,7 +462,7 @@ then VLAN header will be not inserted immediately but only before
|
|||
passing to the physical device (if this device does not support VLAN
|
||||
offloading), the similar on the RX direction - by default the packet
|
||||
will be untagged before being received by VLAN device. Reordering
|
||||
allows to accelerate tagging on egress and to hide VLAN header on
|
||||
allows one to accelerate tagging on egress and to hide VLAN header on
|
||||
ingress so the packet looks like regular Ethernet packet, at the same
|
||||
time it might be confusing for packet capture as the VLAN header does
|
||||
not exist within the packet.
|
||||
|
|
@ -691,7 +691,7 @@ or the internal FDB should be used.
|
|||
- enables the Group Policy extension (VXLAN-GBP).
|
||||
|
||||
.in +4
|
||||
Allows to transport group policy context across VXLAN network peers.
|
||||
Allows one to transport group policy context across VXLAN network peers.
|
||||
If enabled, includes the mark of a packet in the VXLAN header for outgoing
|
||||
packets and fills the packet mark based on the information found in the
|
||||
VXLAN header for incoming packets.
|
||||
|
|
@ -2093,7 +2093,7 @@ flag in the output of the
|
|||
|
||||
To change network namespace for wireless devices the
|
||||
.B iw
|
||||
tool can be used. But it allows to change network namespace only for
|
||||
tool can be used. But it allows one to change network namespace only for
|
||||
physical devices and by process
|
||||
.IR PID .
|
||||
|
||||
|
|
|
|||
|
|
@ -409,7 +409,7 @@ Please take a look at the official documentation for details regarding filters.
|
|||
.SH STATE-FILTER
|
||||
|
||||
.B STATE-FILTER
|
||||
allows to construct arbitrary set of states to match. Its syntax is
|
||||
allows one to construct arbitrary set of states to match. Its syntax is
|
||||
sequence of keywords state and exclude followed by identifier of
|
||||
state.
|
||||
.TP
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@ basic \- basic traffic control filter
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B basic
|
||||
filter allows to classify packets using the extended match infrastructure.
|
||||
filter allows one to classify packets using the extended match infrastructure.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
.BI action " ACTION_SPEC"
|
||||
|
|
|
|||
|
|
@ -12,13 +12,13 @@ fw \- fwmark traffic control filter
|
|||
.SH DESCRIPTION
|
||||
the
|
||||
.B fw
|
||||
filter allows to classify packets based on a previously set
|
||||
filter allows one to classify packets based on a previously set
|
||||
.BR fwmark " by " iptables .
|
||||
If it is identical to the filter's
|
||||
.BR handle ,
|
||||
the filter matches.
|
||||
.B iptables
|
||||
allows to mark single packets with the
|
||||
allows one to mark single packets with the
|
||||
.B MARK
|
||||
target, or whole connections using
|
||||
.BR CONNMARK .
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@ matchall \- traffic control filter that matches every packet
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B matchall
|
||||
filter allows to classify every packet that flows on the port and run a
|
||||
filter allows one to classify every packet that flows on the port and run a
|
||||
action on it.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
|
|
|
|||
|
|
@ -25,7 +25,7 @@ nat - stateless native address translation action
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B nat
|
||||
action allows to perform NAT without the overhead of conntrack, which is
|
||||
action allows one to perform NAT without the overhead of conntrack, which is
|
||||
desirable if the number of flows or addresses to perform NAT on is large. This
|
||||
action is best used in combination with the
|
||||
.B u32
|
||||
|
|
|
|||
|
|
@ -82,7 +82,7 @@ maximum number of packets the qdisc may hold queued at a time.
|
|||
|
||||
.SS delay
|
||||
adds the chosen delay to the packets outgoing to chosen network interface. The
|
||||
optional parameters allows to introduce a delay variation and a correlation.
|
||||
optional parameters allows one to introduce a delay variation and a correlation.
|
||||
Delay and jitter values are expressed in ms while correlation is percentage.
|
||||
|
||||
.SS distribution
|
||||
|
|
@ -99,7 +99,7 @@ is now deprecated due to the noticed bad behavior.
|
|||
.SS loss state
|
||||
adds packet losses according to the 4-state Markov using the transition
|
||||
probabilities as input parameters. The parameter p13 is mandatory and if used
|
||||
alone corresponds to the Bernoulli model. The optional parameters allows to
|
||||
alone corresponds to the Bernoulli model. The optional parameters allows one to
|
||||
extend the model to 2-state (p31), 3-state (p23 and p32) and 4-state (p14).
|
||||
State 1 corresponds to good reception, State 4 to independent losses, State 3
|
||||
to burst losses and State 2 to good reception within a burst.
|
||||
|
|
|
|||
|
|
@ -118,7 +118,7 @@ or a single byte
|
|||
.BI at " AT " offmask " MASK " shift " SHIFT"
|
||||
This is an optional part of
|
||||
.IR RAW_OP
|
||||
which allows to have a variable
|
||||
which allows one to have a variable
|
||||
.I OFFSET
|
||||
depending on packet data at offset
|
||||
.IR AT ,
|
||||
|
|
@ -202,7 +202,7 @@ unexpected things.
|
|||
.B icmp_type
|
||||
.TQ
|
||||
.B icmp_code
|
||||
Again, this allows to change data past the actual IP header itself. It assumes
|
||||
Again, this allows one to change data past the actual IP header itself. It assumes
|
||||
an ICMP header is present immediately following the (minimal sized) IP header.
|
||||
If it is not or the latter is bigger than the minimum of 20 bytes, this will do
|
||||
unexpected things. These fields are eight-bit values.
|
||||
|
|
@ -300,7 +300,7 @@ Keep the addressed data as is.
|
|||
.BI retain " RVAL"
|
||||
This optional extra part of
|
||||
.I CMD_SPEC
|
||||
allows to exclude bits from being changed. Supported only for 32 bits fields
|
||||
allows one to exclude bits from being changed. Supported only for 32 bits fields
|
||||
or smaller.
|
||||
.TP
|
||||
.I CONTROL
|
||||
|
|
|
|||
|
|
@ -92,8 +92,8 @@ packets that came from a specific rule.
|
|||
.TP
|
||||
.BI index " INDEX"
|
||||
Is a unique ID for an action. When creating new action instance, this parameter
|
||||
allows to set the new action index. When using existing action, this parameter
|
||||
allows to specify the existing action index. The index must 32bit unsigned
|
||||
allows one to set the new action index. When using existing action, this parameter
|
||||
allows one to specify the existing action index. The index must 32bit unsigned
|
||||
integer greater than zero.
|
||||
.SH EXAMPLES
|
||||
Sample one of every 100 packets flowing into interface eth0 to psample group 12:
|
||||
|
|
|
|||
|
|
@ -16,9 +16,9 @@ skbedit - SKB editing action
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B skbedit
|
||||
action allows to change a packet's associated meta data. It complements the
|
||||
action allows one to change a packet's associated meta data. It complements the
|
||||
.B pedit
|
||||
action, which in turn allows to change parts of the packet data itself.
|
||||
action, which in turn allows one to change parts of the packet data itself.
|
||||
|
||||
The most unique feature of
|
||||
.B skbedit
|
||||
|
|
|
|||
|
|
@ -16,7 +16,7 @@ tcindex \- traffic control index filter
|
|||
.B action
|
||||
.BR ACTION_SPEC " ]"
|
||||
.SH DESCRIPTION
|
||||
This filter allows to match packets based on their
|
||||
This filter allows one to match packets based on their
|
||||
.B tcindex
|
||||
field value, i.e. the combination of the DSCP and ECN fields as present in IPv4
|
||||
and IPv6 headers.
|
||||
|
|
|
|||
|
|
@ -23,7 +23,7 @@ tunnel_key - Tunnel metadata manipulation
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B tunnel_key
|
||||
action combined with a shared IP tunnel device, allows to perform IP tunnel en-
|
||||
action combined with a shared IP tunnel device, allows one to perform IP tunnel en-
|
||||
or decapsulation on a packet, reflected by
|
||||
the operation modes
|
||||
.IR UNSET " and " SET .
|
||||
|
|
|
|||
|
|
@ -150,7 +150,7 @@ u32 \- universal 32bit traffic control filter
|
|||
.BR at " [ " nexthdr+ " ] "
|
||||
.IR int_value " ]"
|
||||
.SH DESCRIPTION
|
||||
The Universal/Ugly 32bit filter allows to match arbitrary bitfields in the
|
||||
The Universal/Ugly 32bit filter allows one to match arbitrary bitfields in the
|
||||
packet. Due to breaking everything down to values, masks and offsets, It is
|
||||
equally powerful and hard to use. Luckily many abstracting directives are
|
||||
present which allow defining rules on a higher level and therefore free the
|
||||
|
|
@ -375,7 +375,7 @@ or IPv6 (
|
|||
.BR ip6 )
|
||||
header.
|
||||
.IR IP / IP6
|
||||
then allows to match various header fields:
|
||||
then allows one to match various header fields:
|
||||
.RS
|
||||
.TP
|
||||
.BI src " ADDR"
|
||||
|
|
|
|||
|
|
@ -35,7 +35,7 @@ vlan - vlan manipulation module
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B vlan
|
||||
action allows to perform 802.1Q en- or decapsulation on a packet, reflected by
|
||||
action allows one to perform 802.1Q en- or decapsulation on a packet, reflected by
|
||||
the operation modes
|
||||
.IR POP ", " PUSH " and " MODIFY .
|
||||
The
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@ xt - tc iptables action
|
|||
.SH DESCRIPTION
|
||||
The
|
||||
.B xt
|
||||
action allows to call arbitrary iptables targets for packets matching the filter
|
||||
action allows one to call arbitrary iptables targets for packets matching the filter
|
||||
this action is attached to.
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
|
|
|
|||
Loading…
Reference in New Issue